1)The client’s browser divides the URL into diff. parts dividing including address, path name and protocol. 2)DNS translates the domain name into the corresponding IP address .the numeric combination represents the site’s true address on the internet. 3)The browser now decides which protocol should be used .a protocol in common parlance is a language which […]
These are data set types which are mainly used by VSAM.data storage data system. These are accessed on the basis of the file position. In a KSDS, a data file is given a special key, files can be located physically in a separate index file and it can be of any length.
This applications used on different computers over a single LAN and services are being provided in relation to the session layer of OSI model. Every Windows compatible computer has NetBIOS name which can be visible in the control panel/Network. Network Neighborhood and NET USE basically use the feature of NetBIOS. Its specification mentions when a […]
The necessary access control implementation which uses LSM in the kernel, mainly based on the principle of less-known preferences. Well, it is not a Linux distribution but you can call it as a combination set of modification which can be applied to Unix-O.S. This was initially developed by the US National Security Agency and was […]
It is one of the base protocols of the Internet protocol suite. With this, all programs can send messages known as ‘data diagrams’ to one another however it is comparatively less reliable than TCP. It is relatively fast and efficient for many time-sensitive purposes and is also useful for small servers; UDP is basically needed […]
A forth-coming generator to Minix which was developed as Vrijie University in Amsterdam, it is basically an open source operating system. It contributes some additional features (e.g. – X windows system and virtual memory).Its main aim to meet specific needs similar to the way the Linux does and its resource usage is comparatively low.
UDP – User Datagram Protocol. UDP is a stateless protocol in that UDP makes no provision for acknowledgement of packets received. UNIX – UNIX is a multi-user operating system that are commonly used for servers and back-end tasks. It was first developed at Bell Labs but later universities began using it to create a academic […]
SLP – Serial Line Internet Protocol. A standard Protocol used to establish connections over dial-ups. SSL – Secure Socket layer. A method used to encrypt data from a computer to a web server. STM – Synchronous Transfer Mode. A transmission process by which information is transmitted sequentially with respect to time. SSH – Secure Socket […]
Packet Switching – This terms refers to the data from one computer sent to another is broken up into packets and sent along best routes. Parts of the original data is tagged with information of where it is from and where it is going so this allows all different types of packets. PGP – Pretty […]
LAN – Local Area Network. A network of computers within a limited area eg building. Modem – MOdulator and DEModulator. This device is often used to transmit data over networks and telephone lines. In most cases, it is used to convert digital signals from your computer to analogue waves and also vice versa. NOC – […]